blob: f04ec0e9509ab8ceb87284553d0319582d241261 [file] [log] [blame]
// Copyright 2016 The Chromium OS Authors. All rights reserved.
// Use of this source code is governed by a BSD-style license that can be
// found in the LICENSE file.
#include "cryptohome/service_distributed.h"
namespace cryptohome {
ServiceDistributed::ServiceDistributed() {
}
ServiceDistributed::~ServiceDistributed() {
}
void ServiceDistributed::AttestationInitialize() {
}
void ServiceDistributed::AttestationInitializeTpm() {
}
void ServiceDistributed::AttestationInitializeTpmComplete() {
}
void ServiceDistributed::AttestationGetTpmStatus(GetTpmStatusReply* reply) {
}
bool ServiceDistributed::AttestationGetDelegateCredentials(
brillo::SecureBlob* blob,
brillo::SecureBlob* secret,
bool* has_reset_lock_permissions) {
return false;
}
gboolean ServiceDistributed::TpmIsAttestationPrepared(
gboolean* OUT_prepared,
GError** error) {
return FALSE;
}
gboolean ServiceDistributed::TpmVerifyAttestationData(
gboolean is_cros_core,
gboolean* OUT_verified,
GError** error) {
return FALSE;
}
gboolean ServiceDistributed::TpmVerifyEK(
gboolean is_cros_core,
gboolean* OUT_verified,
GError** error) {
return FALSE;
}
gboolean ServiceDistributed::TpmAttestationCreateEnrollRequest(
gint pca_type,
GArray** OUT_pca_request,
GError** error) {
return FALSE;
}
gboolean ServiceDistributed::AsyncTpmAttestationCreateEnrollRequest(
gint pca_type,
gint* OUT_async_id,
GError** error) {
return FALSE;
}
gboolean ServiceDistributed::TpmAttestationEnroll(
gint pca_type,
GArray* pca_response,
gboolean* OUT_success,
GError** error) {
return FALSE;
}
gboolean ServiceDistributed::AsyncTpmAttestationEnroll(
gint pca_type,
GArray* pca_response,
gint* OUT_async_id,
GError** error) {
return FALSE;
}
gboolean ServiceDistributed::TpmAttestationCreateCertRequest(
gint pca_type,
gint certificate_profile,
gchar* username,
gchar* request_origin,
GArray** OUT_pca_request,
GError** error) {
return FALSE;
}
gboolean ServiceDistributed::AsyncTpmAttestationCreateCertRequest(
gint pca_type,
gint certificate_profile,
gchar* username,
gchar* request_origin,
gint* OUT_async_id,
GError** error) {
return FALSE;
}
gboolean ServiceDistributed::TpmAttestationFinishCertRequest(
GArray* pca_response,
gboolean is_user_specific,
gchar* username,
gchar* key_name,
GArray** OUT_cert,
gboolean* OUT_success,
GError** error) {
return FALSE;
}
gboolean ServiceDistributed::AsyncTpmAttestationFinishCertRequest(
GArray* pca_response,
gboolean is_user_specific,
gchar* username,
gchar* key_name,
gint* OUT_async_id,
GError** error) {
return FALSE;
}
gboolean ServiceDistributed::TpmIsAttestationEnrolled(
gboolean* OUT_is_enrolled,
GError** error) {
return FALSE;
}
gboolean ServiceDistributed::TpmAttestationDoesKeyExist(
gboolean is_user_specific,
gchar* username,
gchar* key_name,
gboolean *OUT_exists,
GError** error) {
return FALSE;
}
gboolean ServiceDistributed::TpmAttestationGetCertificate(
gboolean is_user_specific,
gchar* username,
gchar* key_name,
GArray **OUT_certificate,
gboolean* OUT_success,
GError** error) {
return FALSE;
}
gboolean ServiceDistributed::TpmAttestationGetPublicKey(
gboolean is_user_specific,
gchar* username,
gchar* key_name,
GArray **OUT_public_key,
gboolean* OUT_success,
GError** error) {
return FALSE;
}
gboolean ServiceDistributed::TpmAttestationRegisterKey(
gboolean is_user_specific,
gchar* username,
gchar* key_name,
gint *OUT_async_id,
GError** error) {
return FALSE;
}
gboolean ServiceDistributed::TpmAttestationSignEnterpriseChallenge(
gboolean is_user_specific,
gchar* username,
gchar* key_name,
gchar* domain,
GArray* device_id,
gboolean include_signed_public_key,
GArray* challenge,
gint *OUT_async_id,
GError** error) {
return FALSE;
}
gboolean ServiceDistributed::TpmAttestationSignSimpleChallenge(
gboolean is_user_specific,
gchar* username,
gchar* key_name,
GArray* challenge,
gint *OUT_async_id,
GError** error) {
return FALSE;
}
gboolean ServiceDistributed::TpmAttestationGetKeyPayload(
gboolean is_user_specific,
gchar* username,
gchar* key_name,
GArray** OUT_payload,
gboolean* OUT_success,
GError** error) {
return FALSE;
}
gboolean ServiceDistributed::TpmAttestationSetKeyPayload(
gboolean is_user_specific,
gchar* username,
gchar* key_name,
GArray* payload,
gboolean* OUT_success,
GError** error) {
return FALSE;
}
gboolean ServiceDistributed::TpmAttestationDeleteKeys(
gboolean is_user_specific,
gchar* username,
gchar* key_prefix,
gboolean* OUT_success,
GError** error) {
return FALSE;
}
gboolean ServiceDistributed::TpmAttestationGetEK(
gchar** OUT_ek_info,
gboolean* OUT_success,
GError** error) {
return FALSE;
}
gboolean ServiceDistributed::TpmAttestationResetIdentity(
gchar* reset_token,
GArray** OUT_reset_request,
gboolean* OUT_success,
GError** error) {
return FALSE;
}
gboolean ServiceDistributed::GetEndorsementInfo(const GArray* request,
DBusGMethodInvocation* context) {
return FALSE;
}
gboolean ServiceDistributed::InitializeCastKey(const GArray* request,
DBusGMethodInvocation* context) {
return FALSE;
}
} // namespace cryptohome